메뉴 건너뛰기




Volumn 48, Issue 8, 2011, Pages 1542-1553

Detection approach for covert channel based on concurrency conflict interval time

Author keywords

Concurrency control; Covert channel; Covert channel detection; Covert timing channel; Multi level secure

Indexed keywords

CONCURRENCY CONFLICT; COVERT CHANNELS; COVERT TIMING CHANNELS; DATA CONFLICT COVERT CHANNEL; DETECTION APPROACH; DETECTION METHODS; FALSE NEGATIVES; FALSE POSITIVE; INTERVAL TIME; MULTI-LEVEL; ONLINE IMPLEMENTATION; SECURE SYSTEM; SINGLE POINT;

EID: 80052665981     PISSN: 10001239     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (6)

References (33)
  • 1
    • 77957969195 scopus 로고    scopus 로고
    • Covert channel research
    • (in Chinese)
    • Wang Yongji, Wu Jingzheng, Zeng Haitao, et al. Covert channel research[J]. Journal of Software, 2010, 21(9): 2262-2288 (in Chinese)
    • (2010) Journal of Software , vol.21 , Issue.9 , pp. 2262-2288
    • Wang, Y.1    Wu, J.2    Zeng, H.3
  • 2
    • 80052686673 scopus 로고    scopus 로고
    • Design of secure operating systems with high security levels
    • (in Chinese)
    • Qing Sihan, Shen Changxiang. Design of secure operating systems with high security levels[J]. Science in China: Series E Information Sciences, 2007, 37(2): 238-253 (in Chinese)
    • (2007) Science in China: Series E Information Sciences , vol.37 , Issue.2 , pp. 238-253
    • Qing, S.1    Shen, C.2
  • 3
    • 12844265899 scopus 로고    scopus 로고
    • Covert channel analysis in secure operating systems with high security levels
    • (in Chinese)
    • Qing Sihan. Covert channel analysis in secure operating systems with high security levels[J]. Journal of Software. 2004, 15(12): 1837-1849 (in Chinese)
    • (2004) Journal of Software , vol.15 , Issue.12 , pp. 1837-1849
    • Qing, S.1
  • 4
    • 44449087948 scopus 로고    scopus 로고
    • A survey of covert channels and countermeasures in computer network protocols
    • Zander S, Armitage G, Branch P. A survey of covert channels and countermeasures in computer network protocols[J]. Communications Surveys & Tutorials, 2007, 9(3): 44-57
    • (2007) Communications Surveys & Tutorials , vol.9 , Issue.3 , pp. 44-57
    • Zander, S.1    Armitage, G.2    Branch, P.3
  • 5
    • 74049152260 scopus 로고    scopus 로고
    • Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
    • New York: ACM
    • Ristenpart T, Tromer E, Shacham H, et al. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds[C] //Proc of CCS'09. New York: ACM, 2009: 199-212
    • (2009) Proc of CCS'09 , pp. 199-212
    • Ristenpart, T.1    Tromer, E.2    Shacham, H.3
  • 6
    • 80052666134 scopus 로고    scopus 로고
    • Identification and evaluation of sharing memory covert timing channel in Xen virtual machines
    • Los Alamitos, CA: IEEE Computer Society
    • Wu Jingzheng, Wang Wongji, Ding Liping, et al. Identification and evaluation of sharing memory covert timing channel in Xen virtual machines[C] //Proc of CLOUD 2011. Los Alamitos, CA: IEEE Computer Society, 2011: 283-291
    • (2011) Proc of CLOUD 2011 , pp. 283-291
    • Wu, J.1    Wang, W.2    Ding, L.3
  • 7
    • 78650158728 scopus 로고    scopus 로고
    • Determinating timing channels in compute clouds
    • New York: ACM
    • Aviram A, Hu S, Ford B, et al. Determinating timing channels in compute clouds[C] //Proc of CCSW'10. New York: ACM, 2010: 103-108
    • (2010) Proc of CCSW'10 , pp. 103-108
    • Aviram, A.1    Hu, S.2    Ford, B.3
  • 8
    • 0003969633 scopus 로고
    • Trusted computer system evaluation criteria
    • NCSC Fort Meade: National Security Agency (NSA)
    • NCSC. Trusted Computer System Evaluation Criteria[S]. Fort Meade: National Security Agency (NSA), 1985
    • (1985)
  • 9
    • 0003765587 scopus 로고    scopus 로고
    • Common criteria for information technology security evaluation
    • ISO/IEC Switzerland: ISO
    • ISO/IEC. Common Criteria for Information Technology Security Evaluation[S]. , 2005
    • (2005)
  • 10
    • 58149161807 scopus 로고    scopus 로고
    • Information security technology-security techniques requirement for operating system
    • Standardization Administration of the People's Republic of China. Beijing: Standards Press of China, (in Chinese)
    • Standardization Administration of the People's Republic of China. Information Security Technology-Security Techniques Requirement for Operating System[S]. Beijing: Standards Press of China, 2006 (in Chinese)
    • (2006)
  • 11
    • 80052683831 scopus 로고    scopus 로고
    • Constructing scenario of event-flag covert channel in secure operating system
    • Los Alamitos, CA: IEEE Computer Society
    • Wu J, Wang Y, Ding L, et al. Constructing scenario of event-flag covert channel in secure operating system[C] //ICIMT'10. Los Alamitos, CA: IEEE Computer Society, 2010: 371-375
    • (2010) ICIMT'10 , pp. 371-375
    • Wu, J.1    Wang, Y.2    Ding, L.3
  • 12
    • 51649119359 scopus 로고    scopus 로고
    • Covert channel mitigation method for secure real-time database using capacity metric
    • (in Chinese)
    • Zeng Haitao, Wang Yongji, Ruan Li, et al. Covert channel mitigation method for secure real-time database using capacity metric[J]. Journal on Communications, 2008, 20(8): 46-56 (in Chinese)
    • (2008) Journal on Communications , vol.20 , Issue.8 , pp. 46-56
    • Zeng, H.1    Wang, Y.2    Ruan, L.3
  • 13
    • 65349144517 scopus 로고    scopus 로고
    • New definition of small message criterion and its application in transaction covert channel mitigating
    • (in Chinese)
    • Zeng Haitao, Wang Yongji, Zu Wei, et al. New definition of small message criterion and its application in transaction covert channel mitigating[J]. Journal of Software, 2009, 20(4): 985-996 (in Chinese)
    • (2009) Journal of Software , vol.20 , Issue.4 , pp. 985-996
    • Zeng, H.1    Wang, Y.2    Zu, W.3
  • 14
    • 33750931965 scopus 로고    scopus 로고
    • Run-time detection of covert channels
    • Los Alamitos, CA: IEEE Computer Society
    • Nagatou N, Watanabe T. Run-time detection of covert channels[C] //ARES'06. Los Alamitos, CA: IEEE Computer Society, 2006: 577-584
    • (2006) ARES'06 , pp. 577-584
    • Nagatou, N.1    Watanabe, T.2
  • 15
    • 37749053468 scopus 로고    scopus 로고
    • Covert channel analysis in secure database systems with high security levels
    • (in Chinese)
    • Wang Baohua, Li Danning, Li Dan, et al. Covert channel analysis in secure database systems with high security levels[J]. Journal of Computer Research and Development, 2006, 43(Suppl): 168-172 (in Chinese)
    • (2006) Journal of Computer Research and Development , vol.43 , Issue.SUPPL. , pp. 168-172
    • Wang, B.1    Li, D.2    Li, D.3
  • 17
    • 55949099001 scopus 로고    scopus 로고
    • A security proof method for multilevel security models
    • (in Chinese)
    • Si Tiange, Tan Zhiyong, Dai Yiqi. A security proof method for multilevel security models[J]. 2008, 45(10): 1711-1717 (in Chinese)
    • (2008) , vol.45 , Issue.10 , pp. 1711-1717
    • Si, T.1    Tan, Z.2    Dai, Y.3
  • 18
    • 0034313810 scopus 로고    scopus 로고
    • Integrating security and real-time requirements using covert channel capacity
    • Son S, Mukkamala R, DAVID R. Integrating security and real-time requirements using covert channel capacity[J]. IEEE Trans on Knowledge and Data Engineering, 2000, 12(6): 865-879
    • (2000) IEEE Trans on Knowledge and Data Engineering , vol.12 , Issue.6 , pp. 865-879
    • Son, S.1    Mukkamala, R.2    David, R.3
  • 19
    • 0027848097 scopus 로고
    • Database concurrency control in multilevel secure database management systems
    • Keefe T, Tsai W, Srivastava J. Database concurrency control in multilevel secure database management systems[J]. IEEE Trans on Knowledge and Data Engineering, 1993, 5(6): 1039-1055
    • (1993) IEEE Trans on Knowledge and Data Engineering , vol.5 , Issue.6 , pp. 1039-1055
    • Keefe, T.1    Tsai, W.2    Srivastava, J.3
  • 20
    • 71849083789 scopus 로고    scopus 로고
    • A study of on/off timing channel based on packet delay distribution
    • Yao L, Zi X, Pan L, et al. A study of on/off timing channel based on packet delay distribution[J]. Computers & Security, 2009, 28(8): 785-794
    • (2009) Computers & Security , vol.28 , Issue.8 , pp. 785-794
    • Yao, L.1    Zi, X.2    Pan, L.3
  • 21
    • 70349682314 scopus 로고    scopus 로고
    • TCP/IP timing channels: Theory to implementation
    • New York: IEEE Communications Society
    • Sellke S, Wang C, Bagchi S, et al. TCP/IP timing channels: Theory to implementation[C] //INFOCOM'09. New York: IEEE Communications Society, 2009: 2204-2212
    • (2009) INFOCOM'09 , pp. 2204-2212
    • Sellke, S.1    Wang, C.2    Bagchi, S.3
  • 22
    • 14844330726 scopus 로고    scopus 로고
    • IP covert timing channels: Design and detection
    • New York: ACM
    • Cabuk S, Brodley C, Shields C. IP covert timing channels: Design and detection[C] //Proc of CCS'04. New York: ACM, 2004: 178-187
    • (2004) Proc of CCS'04 , pp. 178-187
    • Cabuk, S.1    Brodley, C.2    Shields, C.3
  • 23
    • 80052935703 scopus 로고    scopus 로고
    • Improving performance of network covert timing channel through Huffman coding
    • Seoul, Korea: FTRA
    • Wu J, Wang Y, Ding L, et al. Improving performance of network covert timing channel through Huffman coding[C] //ACSA'10. Seoul, Korea: FTRA, 2010: 512-521
    • (2010) ACSA'10 , pp. 512-521
    • Wu, J.1    Wang, Y.2    Ding, L.3
  • 24
    • 77952331178 scopus 로고    scopus 로고
    • Detecting covert timing channels: An entropy-based approach
    • New York: ACM
    • Gianvecchio S, Wang H. Detecting covert timing channels: An entropy-based approach[C] //Proc of CCS'07. New York: ACM, 2007: 307-316
    • (2007) Proc of CCS'07 , pp. 307-316
    • Gianvecchio, S.1    Wang, H.2
  • 26
    • 85089791033 scopus 로고    scopus 로고
    • On the secrecy of timing-based active watermarking trace-back techniques
    • Washington, DC: IEEE Computer Society
    • Peng P, Ning P, Reeves D S. On the secrecy of timing-based active watermarking trace-back techniques[C] //Proc of SP'06. Washington, DC: IEEE Computer Society, 2006: 334-348
    • (2006) Proc of SP'06 , pp. 334-348
    • Peng, P.1    Ning, P.2    Reeves, D.S.3
  • 27
    • 77957960630 scopus 로고    scopus 로고
    • Research on covert channel measurement and handling in secure real-time database
    • Beijing: Graduate University of Chinese Academy of Sciences, (in Chinese)
    • Zeng Haitao. Research on covert channel measurement and handling in secure real-time database[D]. Beijing: Graduate University of Chinese Academy of Sciences, 2008 (in Chinese)
    • (2008)
    • Zeng, H.1
  • 29
    • 0034775025 scopus 로고    scopus 로고
    • Entropy, entropy rate, and pattern classification as tools to typify complexity in short heart period variability series
    • Porta A, Guzzetti S, Montano N, et al. Entropy, entropy rate, and pattern classification as tools to typify complexity in short heart period variability series[J]. IEEE Trans on Biomedical Engineering, 2001, 48(11): 1282-1291
    • (2001) IEEE Trans on Biomedical Engineering , vol.48 , Issue.11 , pp. 1282-1291
    • Porta, A.1    Guzzetti, S.2    Montano, N.3
  • 30
    • 0031611375 scopus 로고    scopus 로고
    • Measuring regularity by means of a corrected conditional entropy in sympathetic outflow
    • Porta A, Baselli G, Liberati D, et al. Measuring regularity by means of a corrected conditional entropy in sympathetic outflow[J]. Biological Cybernetics, 1998, 78(1): 71-78
    • (1998) Biological Cybernetics , vol.78 , Issue.1 , pp. 71-78
    • Porta, A.1    Baselli, G.2    Liberati, D.3
  • 31
    • 6944244228 scopus 로고    scopus 로고
    • Managing deadline miss ratio and sensor data freshness in real-time databases
    • Kang K, Son S, Stankovic J. Managing deadline miss ratio and sensor data freshness in real-time databases[J]. IEEE Trans on Knowledge and Data Engineering, 2004, 16(10): 1200-1216
    • (2004) IEEE Trans on Knowledge and Data Engineering , vol.16 , Issue.10 , pp. 1200-1216
    • Kang, K.1    Son, S.2    Stankovic, J.3
  • 32
    • 46749133616 scopus 로고    scopus 로고
    • Detecting anomalous access patterns in relational databases
    • Kamra A, Terzi E, Bertino E. Detecting anomalous access patterns in relational databases[J]. The VLDB Journal, 2008, 17(5): 1063-1077
    • (2008) The VLDB Journal , vol.17 , Issue.5 , pp. 1063-1077
    • Kamra, A.1    Terzi, E.2    Bertino, E.3
  • 33
    • 0033878717 scopus 로고    scopus 로고
    • Secure concurrency control in firm real-time database systems
    • George B, Haritsa J. Secure concurrency control in firm real-time database systems[J]. Distributed and Parallel Databases, 2000, 8(1): 41-83
    • (2000) Distributed and Parallel Databases , vol.8 , Issue.1 , pp. 41-83
    • George, B.1    Haritsa, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.